Pages

12/31/12

CHOOSE YOUR BEST OPPORTUNITY



Job Description:

We are looking for Technical Field Application Engineer / Technical marketing executive to Market & Support VLSI, EMBEDDED PRODUCTS in south India.

Salary:                      INR 1,00,000 - 2,00,000 P.A. Along with Salary - FAE will get Attractive     Incentives, Conveyance, Traveling Ta/da
Industry:                  Industrial Products / Heavy Machinery
Functional Area:     Sales, Retail, Business Development
Role Category:       Other
Role:                        Trainee
Keyskills:                 VLSI, EMBEDDED, MARKETING, FAE, TECHNICAL SUPPORT, BANGALORE, MBA, BE

Desired Candidate Profile:
Education:UG - Any Graduate - Any Specialization, Graduation Not Required, B.Tech/B.E. - Any Specialization, Electrical, Electronics/Telecommunication, Instrumentation
PG - Any Postgraduate - Any Specialization, Post Graduation Not Required, MBA/PGDM
Any Specialization, Marketing
Smart, Dynamic, Presentation skills, Hunger to grow, Quick learner, convincing, Target achiever.
BE in Electronics, Electrical, instrumentation with MBA Marketing will be preferable. Driving license is must.

Company Profile:
Silicon Micro Systems
https://www.simsindia.net

We are Manufacturers of VLSI, EMBEDDED, COMMUNICATION and PLC related products, we are distributors for some of the Global related design companies in India since 1997.

Contact Details:
Recruiter Name:       RAMYA ARADHYA
Contact Company:    Silicon world
Telephone:                 08026609313
Reference Id:             SIMS-FAE

For Apply : Click here


Applicants need to go to the venue mentioned or call on the number provided below

Job Description:

Cost to Company (CTC): Rs. 3.53 Lakhs per annum (approximately) including Pay and Dearness Allowance, Conveyance Allowance, Company Accommodation / House Rent Allowance, Free Medical Facility, LTA, CPF, Gratuity etc.

Vacancies:                          21 (UR- 10 OBC- 7 SC – 3 ST - 1)
Scale of Pay and Grade:    Rs. 9160 - 3% -13150/- (S-3)
Qualification:                      SSC/Matric with ITI or Diploma in Engineering from a recognized Board/Institute with valid Heavy Motor Vehicle Driving License. Ex-Servicemen with equivalent qualification may also apply. Candidates must produce latest Driving License Extract Copy issued by the Regional Transport Authority of the concerned State Govt. at the time of job test.
               
Experience:                         Should have post-qualification experience of 3 (Three) years for UR/OBC candidates and 2'/2 (Two & half) years for SC/ST candidates in operating Earth Moving / Material Handling Equipments after obtaining Heavy Vehicle Driving License.

Mode of Selection:               Selection will be through written test, job test and interview to be held at Visakhapatnam.


Apply online : http://www.vizagsteel.com


Last date for apply online : 10.01.2013


For more details : http://www.vizagsteel.com/code/tenders/jobdocs/14631OCM%20New%20Advt.pdf
Last Apply Date:         10 Jan 2013
Salary:                           Rs. 9160 - 3% -13150/- (S-3)
Industry:                        Iron and Steel
Functional Area:           Production, Manufacturing, Maintenance

Desired Candidate Profile
Company Profile
 Visit  Visakhapatnam Steel Plant  website .

Contact Details
Reference Id:http://www.vizagsteel.com

*****Applicants need to go to the venue mentioned or call on the number provided below*****


Detecting and Resolving Firewall Policy Anomalies

ABSTRACT:

The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Firewalls are the most widely deployed security mechanism to ensure the security of private networks in most businesses and institutions. The effectiveness of security protection provided by a firewall mainly depends on the quality of policy configured in the firewall. Unfortunately, designing and managing firewall policies are often error prone due to the complex nature of firewall configurations as well as the lack of systematic analysis mechanisms and tools. In this paper, we represent an innovative policy anomaly management framework for firewalls, adopting a rule-based segmentation technique to identify policy anomalies and derive effective anomaly resolutions. In particular, we articulate a grid-based representation technique, providing an intuitive cognitive sense about policy anomaly. We also discuss a proof-of-concept implementation of a visualization-based firewall policy analysis tool called Firewall Anomaly Management Environment (FAME). In addition, we demonstrate how efficiently our approach can discover and resolve anomalies in firewall policies through rigorous experiments.

EXISTING SYSTEM:
Firewall policy management is a challenging task due to the complexity and interdependency of policy rules. This is further exacerbated by the continuous evolution of network and system environments.

The process of configuring a firewall is tedious and error prone. Therefore, effective mechanisms and tools for policy management are crucial to the success of firewalls.

Existing policy analysis tools, such as Firewall Policy Advisor and FIREMAN, with the goal of detecting policy anomalies have been introduced. Firewall Policy Advisor only has the capability of detecting pair wise anomalies in firewall rules. FIREMAN can detect anomalies among multiple rules by analyzing the relationships between one rule and the collections of packet spaces derived from all preceding rules.

However, FIREMAN also has limitations in detecting anomalies. For each firewall rule, FIREMAN only examines all preceding rules but ignores all subsequent rules when performing anomaly analysis. In addition, each analysis result from FIREMAN can only show that there is a misconfiguration between one rule and its preceding rules, but cannot accurately indicate all rules involved in an anomaly.

PROPOSED SYSTEM:
In this paper, we represent a novel anomaly management framework for firewalls based on a rule-based segmentation technique to facilitate not only more accurate anomaly detection but also effective anomaly resolution.

Based on this technique, a network packet space defined by a firewall policy can be divided into a set of disjoint packet space segments. Each segment associated with a unique set of firewall rules accurately indicates an overlap relation (either conflicting or redundant) among those rules.

We also introduce a flexible conflict resolution method to enable a fine-grained conflict resolution with the help of several effective resolution strategies with respect to the risk assessment of protected networks and the intention of policy definition.

System Configuration:-

H/W System Configuration:-

 ü Processor             -Pentium –III
ü Speed                             -    1.1 Ghz
ü RAM                    -    256 MB(min)
ü Hard Disk            -   20 GB
ü Floppy Drive       -    1.44 MB
ü Key Board            -    Standard Windows Keyboard
ü Mouse                  -    Two or Three Button Mouse
ü Monitor                -    SVGA

 S/W System Configuration:-

v   Operating System          : Windows95/98/2000/XP
v   Front End                      : Java

REFERENCE:
Hongxin Hu, Student Member, IEEE, Gail-Joon Ahn, Senior Member, IEEE, and Ketan Kulkarni,” Detecting and Resolving Firewall Policy Anomalies”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012.
Posted: 28 Dec 2012 12:49 PM PST
         
Walkin Interview from 29th December to 31st December from 11 AM

*******Applicants need to go to the venue mentioned or call on the number provided below*******
Job Description:

Financial Planning Executives

1. Getting regular business from existing set of clients.

2. Acquiring new clients through referrals.

3. Establishing relationships with new clients by regular presentations or
discussions.

4. Consistent achievement of monthly targets.

5. Penetration of all products in all clients" portfolios



Salary:                  INR 1,00,000 - 6,00,000 P.A
Industry:               Banking / Financial Services / Broking
Functional Area:  Sales, Retail, Business Development
Role Category:    Retail Sales
Role:                     Sales/Business Development Manager
Keyskills:             freshers sales financial planning mutual funds Relationship managers

Desired Candidate Profile
Education:(UG - Any Graduate - Any Specialization, Graduation Not Required) AND (PG - Any Postgraduate - Any Specialization, Post Graduation Not Required) AND ( Doctorate - Any Doctorate - Any Specialization, Doctorate Not Required)

Company Profile:

Bajaj Capital Limited
http://www.bajajcapital.com
The Bajaj Capital Group is one of India"s premier Investment Advisory and
Financial Planning companies. We are also SEBI-approved Category I
Merchant Bankers.

We offer personalised Investment Advisory and Financial Planning services
to individual investors, corporate houses, institutional investors,
Non-Resident Indians (NRIs) and High Networth Clients, among others.

As one of India s largest distributors of financial products, we offer a
wide range of investment products such as mutual funds, life and general
insurance, bonds, post office schemes, etc. offered by reputed public and
private and government organisations.

Contact Details:

Recruiter Name:        Amrita Pandya Gupta
Contact Company:     Bajaj Capital Limited
Address:                      97,bajaj House,5th Floor, Nehru Place NEW DELHI,Delhi,India
Telephone:                 91-11-4400044

Walkin Interview from 29th December to 31st December from 11 AM


DATE AND VENUE OF INTERVIEW:

   From - 28th,29th and 31st December
   BAJAJ CAPITAL LTD.
   97 Bajaj house
   5th floor , Nehru Place
  11am - 5pm



Posted: 28 Dec 2012 12:31 PM PST
                                                     MK  Nano Technologies
Job Description:

candidate specifications
Candidates can be in their final year of B.Tech(CS/IT)/ MCA or pass out and should be available from JAN to JUN for such industrial training

During this period of training candidate will be provided extensive training on IT solution/ Products covering entire Software Development Cycle

Performance will be evaluated continuously and qualified candidate will be offered jobs in development or support latest from 1st July 2013 or earlier.

During this period, we will not make any stipend to the candidate but will provide infrastructure facilities at our office at Gurgaon.

All Candidates are required to bring their own laptop.

We prefer candidates with prior knowledge on Microsoft Shop (Visual Studio & .Net 3.5 or above, HTML, JQuery & CSS)

We will not charge anything from candidate in lieu of above training.

We will provide requisite Certificate to the candidates on successful training.

Salary:                       No Stipend
Industry:                    IT-Software / Software Services
Functional Area:       IT Software - Application Programming, Maintenance
Role Category:         Other
Role:                          Trainee
Keyskills:                  Software Engineer / Software Programmer/ Software Trainee / Software Developer, software development, senior software engineer

Desired Candidate Profile:
Education:(UG - B.Tech/B.E. - Computers) OR (PG - MCA - Computers) AND ( Doctorate - Doctorate Not Required)
Please refer to the Job description above

Company Profile:
MK Nano Technologies Pvt Ltd.
We are a software company & our team is specialized in designing & creating tools that can improve productivity of individual or Team and works on all platforms (Mobile, Web & Desktop). We can Develop, Migrate & Monitor applications on conventional servers as well as on Cloud. We guarantee superior service & zero downtime to all our clients

Contact Details;
Recruiter Name:        Neha Sharma
Contact Company:     MK Nano Technologies Pvt Ltd
Reference Id:             MKN/12/12/1001

For Apply : click here
Posted: 27 Dec 2012 10:36 PM PST

Design and Implementation of TARF:
A Trust-Aware Routing Framework for WSNs

ABSTRACT:
             The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks, and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multihop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in TinyOS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.

EXISTING SYSTEM:
                        In the existing system, the multihop routing of WSNs often becomes the target of malicious attacks. An attacker may tamper nodes physically, create traffic collision with seemingly valid transmission, drop or misdirect messages in routes, or jam the communication channel by creating radio interference.

PROPOSED SYSTEM:
                 In the proposed system , to secure the WSNs against adversaries misdirecting the multihop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs.

SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:

         System                 : Pentium IV 2.4 GHz.
         Hard Disk            : 40 GB.
         Floppy Drive       : 1.44 Mb.
         Monitor                : 15 VGA Colour.
         Mouse                  : Logitech.
         Ram                     : 512 Mb.

SOFTWARE REQUIREMENTS:

         Operating system           : - Windows XP
         Coding Language           :-  JAVA

REFERENCE:
                     Guoxing Zhan, Weisong Shi, and Julia Deng, “Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 2, MARCH/APRIL 2012.
Posted: 27 Dec 2012 10:25 PM PST

  ABSTRACT


                 A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a “cut”. In this article we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows (i) every node to detect when the connectivity to a specially designated node has been lost, and (ii) one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious “electrical potential” of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network.

 EXISTING SYSTEM
                    
                 Wireless Multimedia Sensor Networks (WMSNs) has many challenges such as nature of wireless media and multimedia information transmission. Consequently traditional mechanisms for network layers are no longer acceptable or applicable for these networks. Wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a “cut”. Existing cut detection system deployed only for wired networks.
Disadvantages
1. Unsuitable for dynamic network reconfiguration.
2. Single path routing approach.
 PROPOSED SYSTEM

            Wireless sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial and temporal resolution .Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest, resulting in a “cut”. Two nodes are said to be disconnected if there is no path between them. We consider the problem of detecting cuts by the nodes of a wireless network. We assume that there is a specially designated node in the network, which we call the source nodeSince a cut may or may not separate a node from the source node, we distinguish between two distinct outcomes of a cut for a particular node. When a node u is disconnected from the source, we say that a DOS (Disconnected from Source) event has occurred for u. When a cut occurs in the network that does not separate a node u from the source node, we say that CCOS (Connected, but a Cut Occurred Somewhere) event has occurred for u. By cut detection we mean (i) detection by each node of a DOS event when it occurs, and (ii) detection of CCOS events by the nodes close to a cut, and the approximate location of the cut. In this article we propose a distributed algorithm to detect cuts, named the Distributed Cut Detection (DCD) algorithm. The algorithm allows each node to detect DOS events and a subset of nodes to detect CCOS events. The algorithm we propose is distributed and asynchronous: it involves only local communication between neighboring nodes, and is robust to temporary communication failure between node pairs The convergence rate of the computation is independent of the size and structure of the network.


MODULE DESCRIPTION:

DISTRIBUTED CUT DETECTION:
        
                 The algorithm allows each node to detect DOS events and a subset of nodes to detect CCOS events. The algorithm we propose is distributed and asynchronous: it involves only local communication between neighboring nodes, and is robust to temporary communication failure between node pairs. A key component of the DCD algorithm is a distributed iterative computational step through which the nodes compute their (fictitious) electrical potentials. The convergence rate of the computation is independent of the size and structure of the network.

CUT:
                     Wireless sensor networks (WSNs) are a promising technology for  monitoring large regions at high spatial and temporal resolution. In fact, node failure is expected to be quite common due to the typically limited energy budget of the nodes that are powered by small batteries. Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest, resulting in a “cut”. Two nodes are said to be disconnected if there is no path between them.

   SOURCE NODE:
                     We consider the problem of detecting cuts by the nodes of a wireless network. We assume that there is a specially designated node in the network, which we call the source node. The source node may be a base station that serves as an interface between the network and its users.Since a cut may or may not separate a node from the source node, we distinguish between two distinct outcomes of a cut for a particular node.

CCOS   AND   DOS:
                    When a node u is disconnected from the source, we say that a DOS (Disconnected frOm Source) event has occurred for u. When a cut occurs in the network that does not separate a node u from the source node, we say that CCOS (Connected, but a Cut Occurred Somewhere) event has occurred for u. By cut detection we mean (i) detection by each node of a DOS event when it occurs, and (ii) detection of CCOS events by the nodes close to a cut, and the approximate location of the cut.

NETWORK SEPARATION:
                  Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest, resulting in a “cut”. Because of cut, some nodes may separated from the network, that results the separated nodes can’t receive the data from the source node.
 System Configuration:-

H/W System Configuration:-

      Processor                    -    Pentium –III

Speed                                  -    1.1 Ghz
RAM                                    -    256  MB(min)
Hard Disk                           -   20 GB
Floppy Drive                      -    1.44 MB
Key Board                           -    Standard Windows Keyboard
Mouse                                 -    Two or Three Button Mouse
Monitor                              -    SVGA

   S/W System Configuration:-

Operating System            :Windows XP
Front End                          :   JAVA,RMI, SWING

CONCLUSION
                       
                       
                                The DCD algorithm we propose here enables every node of a wireless sensor network to detect DOS (Disconnected frOm Source) events if they occur. Second, it enables a subset of nodes that experience CCOS (Connected, but Cut Occurred Somewhere) events to detect them and estimate the approximate location of the cut in the form of a list of active nodes that lie at the boundary of the cut/hole. The DOS and CCOS events are defined with respect to a specially designated source node. The algorithm is based on ideas from electrical network theory and parallel iterative solution of linear equations. Numerical simulations, as well as experimental evaluation on a real WSN system consisting of micaZ motes, show that the algorithm works effectively with a large classes of graphs of varying size and structure, without requiring changes in the parameters. For certain scenarios, the algorithm is assured to detect connection and disconnection to the source node without error. A key strength of the DCD algorithm is that the convergence rate of the underlying iterative scheme is quite fast and independent of the size and structure of the network, which makes detection using this algorithm quite fast. Application of the DCD algorithm to detect node separation and re-connection to the source in mobile networks is a topic of ongoing research.
Posted: 28 Dec 2012 12:49 PM PST
         
Walkin Interview from 29th December to 31st December from 11 AM

*******Applicants need to go to the venue mentioned or call on the number provided below*******
Job Description:

Financial Planning Executives

1. Getting regular business from existing set of clients.

2. Acquiring new clients through referrals.

3. Establishing relationships with new clients by regular presentations or
discussions.

4. Consistent achievement of monthly targets.

5. Penetration of all products in all clients" portfolios



Salary:                  INR 1,00,000 - 6,00,000 P.A
Industry:               Banking / Financial Services / Broking
Functional Area:  Sales, Retail, Business Development
Role Category:    Retail Sales
Role:                     Sales/Business Development Manager
Keyskills:             freshers sales financial planning mutual funds Relationship managers

Desired Candidate Profile
Education:(UG - Any Graduate - Any Specialization, Graduation Not Required) AND (PG - Any Postgraduate - Any Specialization, Post Graduation Not Required) AND ( Doctorate - Any Doctorate - Any Specialization, Doctorate Not Required)

Company Profile:

Bajaj Capital Limited
http://www.bajajcapital.com
The Bajaj Capital Group is one of India"s premier Investment Advisory and
Financial Planning companies. We are also SEBI-approved Category I
Merchant Bankers.

We offer personalised Investment Advisory and Financial Planning services
to individual investors, corporate houses, institutional investors,
Non-Resident Indians (NRIs) and High Networth Clients, among others.

As one of India s largest distributors of financial products, we offer a
wide range of investment products such as mutual funds, life and general
insurance, bonds, post office schemes, etc. offered by reputed public and
private and government organisations.

Contact Details:

Recruiter Name:        Amrita Pandya Gupta
Contact Company:     Bajaj Capital Limited
Address:                      97,bajaj House,5th Floor, Nehru Place NEW DELHI,Delhi,India
Telephone:                 91-11-4400044

Walkin Interview from 29th December to 31st December from 11 AM


DATE AND VENUE OF INTERVIEW:

   From - 28th,29th and 31st December
   BAJAJ CAPITAL LTD.
   97 Bajaj house
   5th floor , Nehru Place
  11am - 5pm



Posted: 28 Dec 2012 12:31 PM PST
                                                     MK  Nano Technologies
Job Description:

candidate specifications
Candidates can be in their final year of B.Tech(CS/IT)/ MCA or pass out and should be available from JAN to JUN for such industrial training

During this period of training candidate will be provided extensive training on IT solution/ Products covering entire Software Development Cycle

Performance will be evaluated continuously and qualified candidate will be offered jobs in development or support latest from 1st July 2013 or earlier.

During this period, we will not make any stipend to the candidate but will provide infrastructure facilities at our office at Gurgaon.

All Candidates are required to bring their own laptop.

We prefer candidates with prior knowledge on Microsoft Shop (Visual Studio & .Net 3.5 or above, HTML, JQuery & CSS)

We will not charge anything from candidate in lieu of above training.

We will provide requisite Certificate to the candidates on successful training.

Salary:                       No Stipend
Industry:                    IT-Software / Software Services
Functional Area:       IT Software - Application Programming, Maintenance
Role Category:         Other
Role:                          Trainee
Keyskills:                  Software Engineer / Software Programmer/ Software Trainee / Software Developer, software development, senior software engineer

Desired Candidate Profile:
Education:(UG - B.Tech/B.E. - Computers) OR (PG - MCA - Computers) AND ( Doctorate - Doctorate Not Required)
Please refer to the Job description above

Company Profile:
MK Nano Technologies Pvt Ltd.
We are a software company & our team is specialized in designing & creating tools that can improve productivity of individual or Team and works on all platforms (Mobile, Web & Desktop). We can Develop, Migrate & Monitor applications on conventional servers as well as on Cloud. We guarantee superior service & zero downtime to all our clients

Contact Details;
Recruiter Name:        Neha Sharma
Contact Company:     MK Nano Technologies Pvt Ltd
Reference Id:             MKN/12/12/1001

For Apply : click here
Posted: 27 Dec 2012 10:36 PM PST

Design and Implementation of TARF:
A Trust-Aware Routing Framework for WSNs

ABSTRACT:
             The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks, and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multihop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in TinyOS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.

EXISTING SYSTEM:
                        In the existing system, the multihop routing of WSNs often becomes the target of malicious attacks. An attacker may tamper nodes physically, create traffic collision with seemingly valid transmission, drop or misdirect messages in routes, or jam the communication channel by creating radio interference.

PROPOSED SYSTEM:
                 In the proposed system , to secure the WSNs against adversaries misdirecting the multihop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs.

SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:

         System                 : Pentium IV 2.4 GHz.
         Hard Disk            : 40 GB.
         Floppy Drive       : 1.44 Mb.
         Monitor                : 15 VGA Colour.
         Mouse                  : Logitech.
         Ram                     : 512 Mb.

SOFTWARE REQUIREMENTS:

         Operating system           : - Windows XP
         Coding Language           :-  JAVA

REFERENCE:
                     Guoxing Zhan, Weisong Shi, and Julia Deng, “Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 2, MARCH/APRIL 2012.
Posted: 27 Dec 2012 10:25 PM PST

  ABSTRACT


                 A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a “cut”. In this article we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows (i) every node to detect when the connectivity to a specially designated node has been lost, and (ii) one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious “electrical potential” of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network.

 EXISTING SYSTEM
                    
                 Wireless Multimedia Sensor Networks (WMSNs) has many challenges such as nature of wireless media and multimedia information transmission. Consequently traditional mechanisms for network layers are no longer acceptable or applicable for these networks. Wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a “cut”. Existing cut detection system deployed only for wired networks.
Disadvantages
1. Unsuitable for dynamic network reconfiguration.
2. Single path routing approach.
 PROPOSED SYSTEM

            Wireless sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial and temporal resolution .Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest, resulting in a “cut”. Two nodes are said to be disconnected if there is no path between them. We consider the problem of detecting cuts by the nodes of a wireless network. We assume that there is a specially designated node in the network, which we call the source nodeSince a cut may or may not separate a node from the source node, we distinguish between two distinct outcomes of a cut for a particular node. When a node u is disconnected from the source, we say that a DOS (Disconnected from Source) event has occurred for u. When a cut occurs in the network that does not separate a node u from the source node, we say that CCOS (Connected, but a Cut Occurred Somewhere) event has occurred for

1 comments:

  1. DreamHost is ultimately the best hosting provider for any hosting plans you might require.

    ReplyDelete

Blog Archive

UPDATED NEWS OF VARIOUS ASPECTS

ACHIVEMENTS (22) EBOOKS (10) EXAMS (2) GATE (3) GRE (10) INTERVIEW TIPS (2) JOBS (82) materials (27) NEWS (25) no (1) NOTIFICATIONS (23) ONLINE BITS (10) placement papers (1) PREVIOUS PAPERS (25) PROGRAMMES (3) projects (6) RESULTS (14) SYYLABUS (6) textbooks (4) TIME TABLES (12) tofel (2) UPDATES (1) VIDEOS (5)